This paper presents a low-power and potentially energy-autonomous Rotman Lens-based reconfigurable intelligence surface millimeter wave identification (mmID) that is able to harvest and communicate selectively with a ...
详细信息
Polymorphic viruses pose a significant challenge to traditional malware detection methods due to their ability to modify their code structure with each infection, effectively evading signature-based detection. This pa...
详细信息
The facilities on wind energy generation are increasingly finding usage areas in line with the ecologically friendly energy generation approach. One of the important activities of wind power generation facilities, whi...
详细信息
An Intrusion Detection System (IDS) is a system that can detect attacks on a network. IDS systems can be built using machine learning approaches. However, significant network traffic and many features cause machine le...
详细信息
Here we present a rigorous study for the different integrated photonic platforms that can be used for on-chip refractive index (RI) sensing. The study includes the widespread silicon photonics platform, the silicon ni...
详细信息
Wearable devices have received tremendous interest in healthcare monitoring due to their significant advantages in terms of flexibility, noninvasiveness, wireless capability, and portability. However, they still face ...
详细信息
With increasing penetration of renewable energy sources in power distribution systems, the microgrid becomes a fundamental building block for grid modernization. Within a microgrid, renewable energy-based distributed ...
详细信息
Preventing mechanical faults in motors is often impossible, early detection of air gap eccentricity faults in induction motors is critical in preventing damage to the machine. Therefore, designing a reliable, effectiv...
详细信息
Few-shot learning is a tough topic to solve since obtaining a large number of training samples in real applications is challenging. It has attracted increasing attention recently. Meta-learning is a prominent way to a...
详细信息
One of the most extensively used technologies for improving the security of IoT devices is blockchain *** is a new technology that can be utilized to boost the *** is a decentralized peer-to-peer network with no centr...
详细信息
One of the most extensively used technologies for improving the security of IoT devices is blockchain *** is a new technology that can be utilized to boost the *** is a decentralized peer-to-peer network with no central *** nodes on the network mine or verify the data recorded on the *** is a distributed ledger that may be used to keep track of transactions between several *** one can tamper with the data on the blockchain since it is *** the blocks are connected by hashes,the transaction data is *** is managed by a system that is based on the consensus of network users rather than a central *** immutability and tamper-proof nature of blockchain security is based on asymmetric cryptography and ***,Blockchain has an immutable and tamper-proof smart contract,which is a logic that enforces the Blockchain’s *** is a conflict between the privacy protection needs of cyber-security threat intelligent(CTI)sharing and the necessity to establish a comprehensive attack chain during blockchain *** paper presents a blockchain-based data sharing paradigm that protects the privacy of CTI sharing parties while also preventing unlawful sharing and ensuring the benefit of legitimate sharing *** builds a full attack chain using encrypted threat intelligence and exploits the blockchain’s backtracking capacity to finish the decryption of the threat source in the attack *** contracts are also used to send automatic early warning replies to possible attack *** tests are used to verify the feasibility and efficacy of the suggested model.
暂无评论